Virtualization Security
Total Page:16
File Type:pdf, Size:1020Kb
GRD Journals- Global Research and Development Journal for Engineering | Volume 1 | Issue 12 | November 2016 ISSN: 2455-5703 Virtualization Security Abhinav Mishra Rishabh Mishra Scientist C Assistant Professor NIELIT, Gorakhpur, India DSITM, Ghaziabad, India Abstract The recent form of change in working on resources and platform introduced the term virtualization. Virtualization comes with its own merits and challenges. As it hides physical characteristics of the resources and the concept of encapsulation comes into picture. Hypervisor based architecture requires fewer hardware resources and can communicate more efficiently. All major players have introduced their hypervisor based solution to the virtualization. One of the challenges comes with it is the virtualization security. Keywords- Virtualization, attacks, sniffing, hypervisor, vm, vdi I. INTRODUCTION Accessing number of machines from one single host machine is basically server or platform virtualization. Accessed machines are referred as Virtual guest machines and the physical machine on which the machines are hosted is referred as host machine. Later the virtualization expanded its area and it involved resources such as network and memory resources and it is then termed as resource virtualization. Various players have introduced their virtualization software that are drastically being used by the organizations. Top companies in this field are:- 1) VMware: It dominates the server virtualization market with its Enterprise Virtualization Product VSphere 5.1. 2) Microsoft: Being a new entrant in virtualization race, Microsoft has come up with its Enterprise Virtualization Product Hyper-V. 3) Citrix: Known for its Para virtualized hyper visor Xen, Citrix dominates the desktop virtualization sector. 4) Oracle: Being a database giant Oracle is also offering Enterprise Virtualization Product Vbox It’s the IBM who actually introduced the concept of virtualization in the early 1964 with the development of CP-40 followed by CP [-67]/CMS at Cambridge Scientific Center. Which Is a virtual machine/virtual memory time- Sharing operating system for the IBM System. But it was VMware who took the lead with its Enterprise Level Virtualization Product VMware Server released on July 12, 2006, a free machine-level virtualization product followed by GSX, ESX and ESXi. II. HYPERVISOR ARCHITECTURE Hypervisor/Virtual Machine Monitor is software used to create and run virtual machines. Hypervisors can be categorized into two categories ie. Type-I and Type-II. A. Type-I Hypervisor Type-I hypervisor installs directly on the hardware like any other OS and is also known as bare metal hypervisor. It directly controls the physical hardware and manage requests from guest OS. In this environment guest machine operating system/Virtual machine operating system is runs above the hypervisor layer. Fig. 1: Type 1 Hypervisor All rights reserved by www.grdjournals.com 20 Virtualization Security (GRDJE/ Volume 1 / Issue 12 / 003) B. Type-II Hypervisor Type–II hypervisor does not installs directly on the physical hardware like Type-I hypervisor rather it installs within the conventional OS environment and forms a second software layer above which guest operating systems runs. Hosted hypervisors comes in this category. Fig. 2: Type 2 Hypervisor Depending upon the level of abstraction Virtualization is characterized into three main categories. 1) Full Virtualization In full virtualization environment Guest Operating System is totally isolated from the Physical hardware layer by the hypervisor. All the OS-to-hardware requests are handled by the hypervisor. Virtual machine OS is totally unaware of being virtualized. This is the most secure virtualization environment. 2) Hardware Assisted Virtualization In this type of virtualization environment some specific CPU calls from Guest Operating System/Virtual machine are directly handled by the CPU instead of being translated by hypervisor. This reduces the load on hypervisor by removing the time required to translate system calls and hence increases the performance. 3) Para virtualization In this type of virtualization, kernel of the guest OS is modified in a way so that the instruction which cannot be virtualized are replaced by the methods so that they can interact directly with the hypervisor. This type of virtualiFzation is mainly seen in Linux environments like Xen, KVM. III. DIFFERENCE BETWEEN TYPE 1 AND TYPE 2 HYPERVISOR Type 1 hypervisors run directly on the system hardware. Type 2 hypervisors run on a host operating system that provides virtualization services, such as I/O device support and memory management. Figure 2 shows how type 1 and type 2 hypervisors differ. All rights reserved by www.grdjournals.com 21 Virtualization Security (GRDJE/ Volume 1 / Issue 12 / 003) Fig. 3: Difference between Type 1 and Type 2 Hypervisor IV. FACTORS SHOULD BE EXAMINED BEFORE CHOOSING A SUITABLE HYPERVISOR One of the best ways to determine which hypervisor meets your needs is to compare their performance metrics. These include CPU overhead, amount of maximum host and guest memory, and support for virtual processors. But metrics alone should not determine your choice. In addition to the capabilities of the hypervisor, you must also verify the guest operating systems that each hypervisor supports. If you are running heterogeneous systems in your service network, then you must select the hypervisor that has support for the operating systems you currently run. If you run a homogeneous network based on Windows or Linux, then support for a smaller number of guest operating systems might fit your needs. All hypervisors are not made equal, but they all offer similar features. Understanding the features they have as well as the guest operating systems each supports is an essential aspect of any hardware virtualization hypervisor selection process. Matching this data to your organization's requirements will be at the core of the decision you make. (To get started with this process, explore the details of each hypervisor). The following factors should be examined before choosing a suitable hypervisor. A. Virtual Machine Performance Virtual systems should meet or exceed the performance of their physical counterparts, at least in relation to the applications within each server. Everything beyond meeting this benchmark is profit. Ideally, you want each hypervisor to optimize resources on the fly to maximize performance for each virtual machine. The question is how much you might be willing to pay for this optimization. The size or mission-criticality your project generally determines the value of this optimization. B. Memory Management Look for support for hardware-assisted memory virtualization. Memory overcommit and large page table support in the VM guest and hypervisor are preferred features; memory page sharing is an optional bonus feature you might want to consider. C. High Availability Each major vendor has its own high availability solution and the way each achieves it may be wildly different, ranging from very complex to minimalist approaches. Understanding both the disaster prevention and disaster recovery methods for each system is critical. You should never bring any virtual machine online without fully knowing the protection and recovery mechanisms in place. D. Live Migration Live migration is extremely important for users; along with support for live migration across different platforms and the capability to simultaneously live migrate two or more VMs, you need to carefully consider what the individual hypervisor offers in this area. E. Networking, Storage, and Security In networking, hypervisors should support network interface cards (NICs) teaming and load balancing, Unicast isolation, and support for the standard (802.1Q) virtual local area network (VLAN) trucking. Each hypervisor should also support iSCSI- and Fiber Channel-networked storage and enterprise data protection software support with some preferences for tools and APIs, Fiber Channel over Ethernet (FCoE), and virtual disk multi- hypervisor compatibility. All rights reserved by www.grdjournals.com 22 Virtualization Security (GRDJE/ Volume 1 / Issue 12 / 003) F. Management Features Look for such management features as Simple Network Management Protocol (SNMP) trap capabilities, integration with other management software, and fault tolerance of the management server — these features are invaluable to a hypervisor. V. BENEFITS OF VIRTUALIZATION Virtualization has proven to be a revolutionary technology for Enterprise Networks. Here are some of the benefits offered by Virtualization Technology. Virtualization reduces the infrastructure cost by reducing the physical hardware. Less hardware leads to less maintenance costs. Also known as Green Technology as less physical hardware in data center means less heat and less power consumption. More control with Virtual Data Centers. Server Deployment is never been an easy task for administrators but with virtualization server machines can be imported, exported or migrated with so much ease. Faster Re-deployment and Backups as virtual machines are stored in a file format so it becomes easier for administrators to backup virtual machines in open virtualization formats and recover or redeploy them. Features like snapshot can be used to revert the virtual machines to previous states. No Vender Dependencies, with Virtualization it really doesn’t matter what physical hardware you use as machine runs in a virtual environment. With Snapshots and migration of virtual